Digital Designs

Tuesday, October 12, 2010

Microsoft has broken their own record for vulnerabilities fixed previously set from October 2009. They have released security patches fixing a whopping 81 vulnerabilities (including an out-of-band patch) beating their record last year. Several of these vulnerabilities were 0day. 1 of 2 struxnet 0day vulnerabilities have been fixed. IE 6-8 (10 vulnerabilities fixed) even under the newer IE7 and IE8 versions. MRT (Malicious Software removal tool) tool was updated to detect Zeus Trojan that deals with capturing user’s credentials for online banking.

The vulnerability could allow remote code execution if an attacker sent a specially crafted RTSP packet to an affected system. However, Internet access to home media is disabled by default. In this default configuration, the vulnerability can be exploited only by an attacker within the same subnet.

This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs).

The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario.

This security update resolves two privately reported vulnerabilities in the Windows OpenType Font (OTF) format driver. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.

The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted OpenType font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.

Fixes 11 vulnerabilities in Microsoft Word. The vulnerabilities could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user.

Fixes 13 vulnerabilities in Microsoft Excel. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file or a specially crafted Lotus 1-2-3 file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user.

The vulnerability could allow remote code execution if a user visited a specially crafted Web page. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system.

Fixes a vulnerability in Wordpad and the Windows shell that allows remote code execution. The vulnerability could allow remote code execution if a user opens a specially crafted file using WordPad or selects or opens a shortcut file that is on a network or WebDAV share.

A stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) allowing for local privilege escalation. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.

Denial of service vulnerability in ISS web servers running SSL. The vulnerability could allow denial of service if an affected system received a specially crafted packet message via Secure Sockets Layer (SSL). By default, all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not configured to receive SSL network traffic.

A vulnerability in the disk clustering services creates backup volumes that allow everyone to read, edit or delete files. This could leave the door wide open to attackers or insiders looking for information that has been protected by file system permissions.

This security update resolves a publicly disclosed vulnerability in ASP.NET. The vulnerability could allow information disclosure. An attacker who successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server. This vulnerability can also be used for data tampering, which, if successfully exploited, could be used to decrypt and tamper with the data encrypted by the server. Microsoft .NET Framework versions prior to Microsoft .NET Framework 3.5 Service Pack 1 are not affected by the file content disclosure portion of this vulnerability.

Other Updates & News

Oracle Java updatev.6 update 22fixed 29 security vulnerabilitiesfixed TLS/SSL renegotiation hole - their own implementation of the protocol was not fixed yetfixed root CA and various other issuesFoxit Reader 4.2Many switch from Adobe Reader to Foxit Reader which is less weightBuffer-overflow issue - file containing over 512 characters, will crash the reader, which potentially opens the door to buffer-overflowFacebookFacebook has added one-time password supportPurpose to login using a one-time password on a system you do not control and question the system’s security environment (such as the possibility of having keyloggers, etc)txt string otp to number 3265 will receive a one-time password that expires after 20 minutes. Must register cellphone number to facebook account.UAE and RIMAgreement has been made and the UAE and RIM pertaining to banning Blackberry cell phone technology in the UAESaudi Arabia and India has backed down as well.RIM’s technology is strongly encrypted to the point where no ease-dropping or man-in-the-middle session can not be taken place.What changed though for both the UAE and RIM to come into an agreement? RIM will not disclose stating that it is proprietary information.Amazon KindleJailbroken Kindles can run Zork from Infocon.

No comments:

Post a Comment

Thank you for your contribution. Your post will be published shortly after it is filtered for any inappropriate material. Please do not use ALL CAPS, flame, use inappropriate material/references in your post or they may not be published.

Commercial customers can benefit from our Managed IT services, allowing owners to concentrate on their core business objectives. Our Web services will increase your online exposure, stand out from competitors, and bring people to your business, not just your website.